AWS managed policies for AWS License Manager - AWS License Manager

AWS managed policies for AWS License Manager

To add permissions to users, groups, and roles, it is easier to use AWS managed policies than to write policies yourself. It takes time and expertise to create IAM customer managed policies that provide your team with only the permissions they need. To get started quickly, you can use our AWS managed policies. These policies cover common use cases and are available in your AWS account. For more information about AWS managed policies, see AWS managed policies in the IAM User Guide.

AWS services maintain and update AWS managed policies. You can't change the permissions in AWS managed policies. Services occasionally add additional permissions to an AWS managed policy to support new features. This type of update affects all identities (users, groups, and roles) where the policy is attached. Services are most likely to update an AWS managed policy when a new feature is launched or when new operations become available. Services do not remove permissions from an AWS managed policy, so policy updates won't break your existing permissions.

Additionally, AWS supports managed policies for job functions that span multiple services. For example, the ReadOnlyAccess AWS managed policy provides read-only access to all AWS services and resources. When a service launches a new feature, AWS adds read-only permissions for new operations and resources. For a list and descriptions of job function policies, see AWS managed policies for job functions in the IAM User Guide.

AWS managed policy: AWSLicenseManagerServiceRolePolicy

This policy is attached to the service-linked role named AWSServiceRoleForAWSLicenseManagerRole to allow License Manager to call API actions to manage licenses on your behalf. For more information about the service-linked role, see Permissions for the core role.

The role permissions policy allows License Manager to complete the following actions on the specified resources.

Action Resource ARN
iam:CreateServiceLinkedRole arn:aws:iam::*:role/aws-service-role/license-management.marketplace.amazonaws.com/AWSServiceRoleForMarketplaceLicenseManagement
iam:CreateServiceLinkedRole arn:aws:iam::*:role/aws-service-role/license-manager.member-account.amazonaws.com/AWSServiceRoleForAWSLicenseManagerMemberAccountRole
s3:GetBucketLocation arn:aws:s3:::aws-license-manager-service-*
s3:ListBucket arn:aws:s3:::aws-license-manager-service-*
s3:ListAllMyBuckets *
s3:PutObject arn:aws:s3:::aws-license-manager-service-*
sns:Publish arn:aws::sns:*:*:aws-license-manager-service-*
sns:ListTopics *
ec2:DescribeInstances *
ec2:DescribeImages *
ec2:DescribeHosts *
ssm:ListInventoryEntries *
ssm:GetInventory *
ssm:CreateAssociation *
organizations:ListAWSServiceAccessForOrganization *
organizations:DescribeOrganization *
organizations:ListDelegatedAdministrators *
license-manager:GetServiceSettings *
license-manager:GetLicense* *
license-manager:UpdateLicenseSpecificationsForResource *
license-manager:List* *

To view the permissions for this policy in the AWS Management Console, see AWSLicenseManagerServiceRolePolicy.

AWS managed policy: AWSLicenseManagerMasterAccountRolePolicy

This policy is attached to the service-linked role named AWSServiceRoleForAWSLicenseManagerMasterAccountRole to allow License Manager to call API actions that perform license management for a central management account on your behalf. For more information about the service-linked role, see License Manager – Management account role.

The role permissions policy allows License Manager to complete the following actions on the specified resources.

Action Resource ARN
s3:GetBucketLocation arn:aws:s3:::aws-license-manager-service-*
s3:ListBucket arn:aws:s3:::aws-license-manager-service-*
s3:GetLifecycleConfiguration arn:aws:s3:::aws-license-manager-service-*
s3:PutLifecycleConfiguration arn:aws:s3:::aws-license-manager-service-*
s3:GetBucketPolicy arn:aws:s3:::aws-license-manager-service-*
s3:PutBucketPolicy arn:aws:s3:::aws-license-manager-service-*
s3:AbortMultipartUpload arn:aws:s3:::aws-license-manager-service-*
s3:PutObject arn:aws:s3:::aws-license-manager-service-*
s3:GetObject arn:aws:s3:::aws-license-manager-service-*
s3:ListBucketMultipartUploads arn:aws:s3:::aws-license-manager-service-*
s3:ListMultipartUploadParts arn:aws:s3:::aws-license-manager-service-*
s3:DeleteObject arn:aws:s3:::aws-license-manager-service-*/resource-sync/*
athena:GetQueryExecution *
athena:GetQueryResults *
athena:StartQueryExecution *
glue:GetTable *
glue:GetPartition *
glue:GetPartitions *
glue:CreateTable See footnote ¹
glue:UpdateTable See footnote ¹
glue:DeleteTable See footnote ¹
glue:UpdateJob See footnote ¹
glue:UpdateCrawler See footnote ¹
organizations:DescribeOrganization *
organizations:ListAccounts *
organizations:DescribeAccount *
organizations:ListChildren *
organizations:ListParents *
organizations:ListAccountsForParent *
organizations:ListRoots *
organizations:ListAWSServiceAccessForOrganization *
ram:GetResourceShares *
ram:GetResourceShareAssociations *
ram:TagResource *
ram:CreateResourceShare *
ram:AssociateResourceShare *
ram:DisassociateResourceShare *
ram:UpdateResourceShare *
ram:DeleteResourceShare *
resource-groups:PutGroupPolicy *
iam:GetRole *
iam:PassRole arn:aws:iam::*:role/LicenseManagerServiceResourceDataSyncRole*
cloudformation:UpdateStack arn:aws:cloudformation:*:*:stack/LicenseManagerCrossAccountCloudDiscoveryStack/*
cloudformation:CreateStack arn:aws:cloudformation:*:*:stack/LicenseManagerCrossAccountCloudDiscoveryStack/*
cloudformation:DeleteStack arn:aws:cloudformation:*:*:stack/LicenseManagerCrossAccountCloudDiscoveryStack/*
cloudformation:DescribeStacks arn:aws:cloudformation:*:*:stack/LicenseManagerCrossAccountCloudDiscoveryStack/*

¹ The following are the resources defined for the AWS Glue actions:

  • arn:aws:glue:*:*:catalog

  • arn:aws:glue:*:*:crawler/LicenseManagerResourceSynDataCrawler

  • arn:aws:glue:*:*:job/LicenseManagerResourceSynDataProcessJob

  • arn:aws:glue:*:*:table/license_manager_resource_inventory_db/*

  • arn:aws:glue:*:*:table/license_manager_resource_sync/*

  • arn:aws:glue:*:*:database/license_manager_resource_inventory_db

  • arn:aws:glue:*:*:database/license_manager_resource_sync

To view the permissions for this policy in the AWS Management Console, see AWSLicenseManagerMasterAccountRolePolicy.

AWS managed policy: AWSLicenseManagerMemberAccountRolePolicy

This policy is attached to the service-linked role named AWSServiceRoleForAWSLicenseManagerMemberAccountRole to allow License Manager to call API actions for license management from a configured management account on your behalf. For more information, see License Manager – Member account role.

The role permissions policy allows License Manager to complete the following actions on the specified resources.

Action Resource ARN
license-manager:UpdateLicenseSpecificationsForResource *
license-manager:GetLicenseConfiguration *
ssm:ListInventoryEntries *
ssm:GetInventory *
ssm:CreateAssociation *
ssm:CreateResourceDataSync *
ssm:DeleteResourceDataSync *
ssm:ListResourceDataSync *
ssm:ListAssociations *
ram:AcceptResourceShareInvitation *
ram:GetResourceShareInvitations *

To view the permissions for this policy in the AWS Management Console, see AWSLicenseManagerMemberAccountRolePolicy.

AWS managed policy: AWSLicenseManagerConsumptionPolicy

You can attach the AWSLicenseManagerConsumptionPolicy policy to your IAM identities. This policy grants permissions that allow access to the License Manager API actions required to consume licenses. For more information, see License usage.

To view the permissions for this policy, see AWSLicenseManagerConsumptionPolicy in the AWS Management Console.

AWS managed policy: AWSLicenseManagerUserSubscriptionsServiceRolePolicy

This policy is attached to the service-linked role named AWSServiceRoleForAWSLicenseManagerUserSubscriptionsService policy to allow License Manager to call API actions to manage user-based subscription resources. For more information, see License Manager – User-based subscription role.

The role permissions policy allows License Manager to complete the following actions on the specified resources.

Action Resource ARN
ds:DescribeDirectories *
ds:GetAuthorizedApplicationDetails *
ec2:CreateTags arn:aws:ec2:*:*:instance/* ¹
ec2:DescribeInstances *
ec2:DescribeVpcPeeringConnections *
ec2:TerminateInstances arn:aws:ec2:*:*:instance/* ¹
ssm:DescribeInstanceInformation *
ssm:GetCommandInvocation *
ssm:GetInventory *
ssm:ListCommandInvocations *
ssm:SendCommand arn:aws:ssm:*::document/AWS-RunPowerShellScript ²

arn:aws:ec2:*:*:instance/* ²

¹ License Manager can only create tags on and terminate instances which have the product codes bz0vcy31ooqlzk5tsash4r1ik, 77yzkpa7kvee1y1tt7wnsdwoc, or d44g89hc0gp9jdzm99rznthpw.

² License Manager can only execute an SSM Run Command with the AWS-RunPowerShellScript document on instances with the tag name of AWSLicenseManager and a value of UserSubscriptions.

To view the permissions for this policy in the AWS Management Console, see AWSLicenseManagerUserSubscriptionsServiceRolePolicy.

AWS managed policy: AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy

This policy is attached to the service-linked role named AWSServiceRoleForAWSLicenseManagerLinuxSubscriptionsService policy to allow License Manager to call API actions to manage Linux subscriptions resources. For more information, see License Manager – Linux subscriptions role.

The role permissions policy allows License Manager to complete the following actions on the specified resources.

Action Conditions Resource
ec2:DescribeInstances N/A *
ec2:DescribeRegions N/A *
organizations:DescribeOrganization N/A *
organizations:ListAccounts N/A *
organizations:DescribeAccount N/A *
organizations:ListChildren N/A *
organizations:ListParents N/A *
organizations:ListAccountsForParent N/A *
organizations:ListRoots N/A *
organizations:ListAWSServiceAccessForOrganization N/A *
organizations:ListDelegatedAdministrators N/A *
secretsmanager:GetSecretValue

StringEquals:

"aws:ResourceTag/LicenseManagerLinuxSubscriptions": "enabled"

"aws:ResourceAccount": "${aws:PrincipalAccount}"

arn:aws:secretsmanager:*:*:secret:*
kms:Decrypt

StringEquals:

"aws:ResourceTag/LicenseManagerLinuxSubscriptions": "enabled",

"aws:ResourceAccount": "${aws:PrincipalAccount}"

StringLike:

"kms:ViaService": [ "secretsmanager.*.amazonaws.com" ]

arn:aws:kms:*:*:key/*

To view the permissions for this policy in the AWS Management Console, see AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy.

License Manager updates to AWS managed policies

View details about updates to AWS managed policies for License Manager since this service began tracking these changes.

Change Description Date
AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy – Update to an existing policy License Manager added permissions to store and retrieve secrets from AWS Secrets Manager, and to use AWS KMS keys to decrypt access token secrets for Bring Your Own License (BYOL) subscriptions. May 22, 2024
AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy – New policy License Manager added a permission to create the service-linked role named AWSServiceRoleForAWSLicenseManagerLinuxSubscriptionsService. This role provides License Manager permission to list AWS Organizations and Amazon EC2 resources. December 21, 2022
AWSLicenseManagerUserSubscriptionsServiceRolePolicy – Update to an existing policy License Manager added the ec2:DescribeVpcPeeringConnections permission. November 28, 2022
AWSLicenseManagerUserSubscriptionsServiceRolePolicy – New policy License Manager added a permission to create the service-linked role named AWSLicenseManagerUserSubscriptionsServiceRolePolicy. This role provides License Manager permission to list AWS Directory Service resources, utilize Systems Manager features, and manage Amazon EC2 resources created for user-based subscriptions. July 18, 2022
AWSLicenseManagerMasterAccountRolePolicy – Update to an existing policy License Manager added the resource-groups:PutGroupPolicy permission for resource groups managed by AWS Resource Access Manager. June 27, 2022
AWSLicenseManagerMasterAccountRolePolicy – Update to an existing policy License Manager changed the AWS managed policy AWSLicenseManagerMasterAccountRolePolicy condition key for AWS Resource Access Manager from using ram:ResourceTag to aws:ResourceTag. November 16, 2021
AWSLicenseManagerConsumptionPolicy – New policy License Manager added a new policy that grants permissions to consume licenses. August 11, 2021
AWSLicenseManagerServiceRolePolicy – Update to an existing policy License Manager added a permission to list delegated administrators and a permission to create the service-linked role named AWSServiceRoleForAWSLicenseManagerMemberAccountRole. June 16, 2021
AWSLicenseManagerServiceRolePolicy – Update to an existing policy License Manager added a permission to list all License Manager resources, such as license configurations, licenses, and grants. June 15, 2021
AWSLicenseManagerServiceRolePolicy – Update to an existing policy License Manager added a permission to create the service-linked role named AWSServiceRoleForMarketplaceLicenseManagement. This role provides AWS Marketplace with permissions to create and manage licenses in License Manager. For more information, see Service-linked roles for AWS Marketplace in the AWS Marketplace Buyer Guide. March 9, 2021
License Manager started tracking changes License Manager started tracking changes to its AWS managed policies. March 9, 2021